ANTI-WEBINARS
Richard Nootebos
Country manager, Netwrix
Hot IT security topics
30 minutes or shorter
Your productive coffee break
Watch or listen as a podcast
No technical demos
CYBERSECURITY
Many people think that IT risk assessment has to be a complicated and expensive process. Let's bust this myth together! In this session, we discuss the 5 most common myths about IT risk assessment, and you can create a list of key steps in an effective risk assessment program.
Don't waste time on IT risks
Never miss a Microsoft 365-related threat
IT pros are superheroes. Let's talk about how you can make your lives easier and keep your Microsoft 365 environment manageable and secure by following some best practices and top-notch tips.
You probably already know that most of IT security incidents are caused not by an external attack, but by users. How do you make sure you detect mistakes before any harm is done?
We know what you did last summer
The Good, the Bad,
and the Ugly
How to know that you are investing in the right Data Classification solution? Why is it important to use Data Classification in the first place?
A Fistful of Dollars (Bitcoins)
Ransomware is here to stay and is evolving. Learn about the latest news and a real-life case study. Discover the best practices to protect your data against ransomware.
The Hateful Eight
Let's talk about 8 annoying incidents in your IT infrastructure you need to always be on top of. We will show you how to easily pull up reports that will help you gain visibility in your infrastructure.
© 2020 Netwrix Corporation
Privacy Policy | EU Privacy Policy | EULA
300 Spectrum Center Drive, Suite 200 Irvine, CA 92618
ANTI-WEBINARS
Hot IT security topics
30 minutes or shorter
Your productive coffee break
Watch or listen as a podcast
No technical demos
CYBERSECURITY
RECORDED SESSIONS:
Don't waste time on IT risks
Many people think that IT risk assessment has to be a complicated and expensive process. Let's bust this myth together! In this session, we discuss the 5 most common myths about IT risk assessment, and you can create a list of key steps in an effective risk assessment program.
Never miss a Microsoft 365-related threat
IT pros are superheroes. Let's talk about how you can make your lives easier and keep your Microsoft 365 environment manageable and secure by following some best practices and top-notch tips.
We know what you did last summer
You probably already know that most of IT security incidents are caused not by an external attack, but by users. How do you make sure you detect mistakes before any harm is done?
The Good, the Bad and the Ugly
How to know that you are investing in the right Data Classification solution? Why is it important to use Data Classification in the first place?
A Fistful of Dollars (Bitcoins)
Ransomware is here to stay and is evolving. Learn about the latest news and a real-life case study. Discover the best practices to protect your data against ransomware.
The Hateful Eight
Let's talk about 8 annoying incidents in your IT infrastructure you need to always be on top of. We will show you how to easily pull up reports that will help you gain visibility in your infrastructure.
© 2020 Netwrix Corporation
Privacy Policy | EU Privacy Policy | EULA
300 Spectrum Center Drive, Suite 200 Irvine, CA 92618